Collection of Offensive C# Tooling
☆13Nov 4, 2021Updated 4 years ago
Alternatives and similar repositories for OffensiveCSharp
Users that are interested in OffensiveCSharp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Exploits written while preparing for the OSED exam☆26Apr 30, 2024Updated 2 years ago
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆171Jan 25, 2024Updated 2 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆11Aug 2, 2021Updated 4 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 5 years ago
- ☆14Feb 4, 2024Updated 2 years ago
- Download a .NET payload and run it on memory☆67Apr 12, 2019Updated 7 years ago
- ☆14Jun 22, 2022Updated 3 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Cobalt Strike random C2 Profile generator☆16Apr 3, 2026Updated last month
- Custom mini tools during Red Teaming engagements☆24May 12, 2026Updated last week
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 10 months ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- ExchangeHound is a defensive BloodHound OpenGraph collector for on-prem Microsoft Exchange that maps mailbox delegation and Exchange priv…☆72Apr 17, 2026Updated last month
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 10 months ago
- Bypass AMSI by patching AmsiScanBuffer☆283Jun 4, 2021Updated 4 years ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆20Oct 24, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆306Mar 31, 2022Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)☆117Jun 7, 2023Updated 2 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Jun 6, 2023Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆28Oct 30, 2021Updated 4 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆19Jul 15, 2025Updated 10 months ago
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆24Nov 20, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Windows Internals Book 7th edition Tools☆17Apr 26, 2020Updated 6 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆10Dec 12, 2020Updated 5 years ago
- Performance Monitor Volatile Environment LPE☆18Jun 28, 2025Updated 10 months ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- Injecting shellcode into a process memory and executing it in C#☆49Oct 2, 2022Updated 3 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year